- You've done the planning…and now comes the moment of truth:…actually conducting the assessment.…Luckily, the written assessment plan provides the blueprint…which all parties should know and follow…to complete the security tests.…In fact, if there's any reason to make changes…to the final authorized plan,…permission should be obtained in writing…from the original signers.…Ideally, security tasks will be conducted…in accordance to the assessment plan…without any issues or incidents.…

However, problems can occur.…Tests may cause a system outage…or a security attack can be discovered in progress.…When something like this happens,…the team conducting the assessment must know how to react.…A well-written assessment plan will describe…which actions to take and whom to contact…in the event of these contingencies.…When in doubt though, the assessor in charge…should follow standard escalation procedures…to notify the appropriate personnel that there's a problem.…

Other potential roadblocks to successfully…conducting a security assessment…

Resume Transcript Auto-Scroll

Author

Released

4/12/2017

This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure.